March Sale - Special 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 70dumps

200-901 Questions and Answers

Question # 6

Drag and drop elements of the RESTCONF protocol stack from the left onto the correct description on the right. Not all elements on the left are used.

Full Access
Question # 7

Which action does the Git command git merge allow the development to perform?

A.

Combine multiple sequence of commits into one unified history.

B.

Push changes to the remote repository

C.

Switch between branches

D.

Create, list, rename, and delete branches

Full Access
Question # 8

Which status code is used by a REST API to indicate that the submitted payload is incorrect?

A.

400

B.

403

C.

405

D.

429

Full Access
Question # 9

Drag and drop the HTTP methods from the left onto their generally accepted corresponding create, read, update, and delete operations on the right.

Full Access
Question # 10

Refer to the exhibit.

Drag and drop the variables from the left onto the item numbers on the right that match the missing assignments in the exhibit.

Full Access
Question # 11

Refer to the exhibit.

What caused the error in this API request?

A.

The API resource does not support the POST operation

B.

The API resource does not support JSON format payloads.

C.

The submitted JSON payload includes a field that is not supported by the API resource.

D.

The submitted JSON payload has a formatting issue

Full Access
Question # 12

Which two types of NAT are used in a network? (Choose two.)

A.

Static NAT

B.

Normal NAT

C.

Multicast NAT

D.

Dynamic NAT

E.

Router NAT

Full Access
Question # 13

On which port does NETCONF operate by default?

A.

23

B.

443

C.

822

D.

830

Full Access
Question # 14

A company has written a script that creates a log bundle from the Cisco DNA Center every day. The script runs without error and the bundles are produced. However, when the script is run during business hours, report poor voice quality of phones calls. What explains this behavior?

A.

The application is running in the Voice VLAN and causes delays and jitter in the subnet.

B.

The speed and duplex settings in Cisco DNA Center are sot incorrectly, which causes the transfer to be too slow.

C.

9 The script is written in a low-level programming language where there is no memory safety. This causes a buffer overflow and disruption on the network.

D.

Generating the logs causes the CPU on the network controller to spike, which causes delays m forwarding the voice IP packets.

Full Access
Question # 15

Refer to the exhibit.

What is the value of the node defined by this YANG structure?

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 16

Refer to the exhibit.

Fill in the blanks to complete the cURL command to the list of networks in the Meraki organization with an id of 384279060

Full Access
Question # 17

Fill in the blanks to complete the statement.

Given a username of “devnet” And a password “Cisco123”, applications must create a base64 encoding of the string” ____________ ” when sanding HTTP requests to an API that uses _______________ authentication.

Full Access
Question # 18

Package updates from a local server fail to download. However, the same updates work when a much slower external repository is used. Way are local updates failing?

A.

The update utility is trying to use a proxy to access the internal resource.

B.

The Internet connection is too slow.

C.

The Internet is down at the moment, which causes the local server to not be able to respond.

D.

The server is running out of disk space.

Full Access
Question # 19

Drag and drop the network automation interfaces from the left onto the transport protocols that they support on the right.

Full Access
Question # 20

Refer to the exhibit.

A process on the host wants to access the service running inside this Docker container. Which port is used to make a connection?

A.

only outbound connections between 3000 and 5000 are possible

B.

port 3000

C.

any port between 3000 and 5000

D.

port 5000

Full Access
Question # 21

What is a characteristic of RPC APIs compared to REST APIs?

A.

Authentication is done over provisions for the service caller and vice versa for RPC API, and REST API uses HTTP headers for authentication.

B.

All communications between the client and server must be stateless for RPC API, and REST API is stateful.

C.

The architecture model for RPC API is resource-focused, and REST API is procedure-focused.

D.

The data payload must be in JSON format for RPC API, and REST API allows JSON and XML formats.

Full Access
Question # 22

Refer to the exhibit. The YAML shown contains an object "param0" that is equal to "Workflow1", a second object "param1" that contains an object called "list" which contains an array of two objects, "name" (equal to "VLAN_ID") and "value" (equal to a text value "198"), and finally a third object "param2" that is equal to "0". What is the equivalent message in JSON data format?

A.

C:\Users\Admin\Desktop\Data\Odt data\Untitled.jpg

B.

C:\Users\Admin\Desktop\Data\Odt data\Untitled.jpg

C.

C:\Users\Admin\Desktop\Data\Odt data\Untitled.jpg

D.

C:\Users\Admin\Desktop\Data\Odt data\Untitled.jpg

Full Access
Question # 23

A developer plans to deploy a new application that will use an API to implement automated data collection from Webex with these requirements:

The application was created by using the request library.

Requires HTTP basic authentication.

Provides data in JSON or XML formats.

Which Cisco DevNet resource helps the developer with how to use the API?

A.

DevNet sandbox

B.

API documentation

C.

forums

D.

DevNet code exchange

Full Access
Question # 24

Refer to the exhibit.

A developer just finished testing a Python script and wants to save the list of packages and versions installed on the current machine. The developer must make sure that it will not cause any issues if tested on another device due to different library versions. Which line of code needs to be placed on the snippet where the code is missing?

A.

pip freeze 2> requirements.txt

B.

pip freeze > requirements.txt

C.

pip freeze => requirements.txt

D.

pip freeze | requirements.txt

Full Access
Question # 25

Which standard supported by Cisco IOS XE and Cisco NX-OS is used for automating the configuration of multiple devices across a network?

A.

SNMP – YANG

B.

SYSLOG – YANG

C.

CLI – YANG

D.

NETCONF – YANG

Full Access
Question # 26

A developer creates a new application, but the application must be tested before being released to a customer. When a mobile phone that uses 4G is used to access the application, the request fails. Why does the connection to the application fail?

A.

The application is hosted on premises and VPN connectivity is required

B.

The application must be added to the production server before testing.

C.

The application must be moved to the cloud before testing is possible.

D.

The application connectivity is limited to HTTPS protocol.

Full Access
Question # 27

An engineer needs to collect information about 20,000 Bluetooth clients using the Cisco Meraki API. The API returns only 1,000 results. One of the HTTP response headers has the data:

Link: https://api.meraki.com.info/api/v0/networks/ABC/bluetoothClients?perPage=1000 &startingAfter=1000>;rel=“next”

Which RFC is implemented by the API to apply the restriction?

A.

RFC 5988 – Web Linking

B.

RFC 5890 – Response Constraints

C.

RFC 5005 – Feed Paging and Archiving

D.

RFC 5446 – Content Limits

Full Access
Question # 28

Refer to the exhibit. Which RESTCONF request results in this response?

A.

C:\Users\Admin\Desktop\Data\Odt data\Untitled.jpg

B.

C:\Users\Admin\Desktop\Data\Odt data\Untitled.jpg

C.

C:\Users\Admin\Desktop\Data\Odt data\Untitled.jpg

D.

C:\Users\Admin\Desktop\Data\Odt data\Untitled.jpg

Full Access
Question # 29

A developer creates an application that must provide an encrypted connection or API keys. The keys will be used to communicate with a REST API. Which command must be used for the secure connection?

A.

curl –X PUSH ‘http://username.app.com/endpoint/?api_key=12345abcdef’

B.

curl –v ‘ftp://username.app.com/endpoint/?api_key=12345abcdef’

C.

curl –X GET ‘https://username.app.com/endpoint/?api_key=12345abcdef’

D.

curl –X GET ‘http://username.app.com/endpoint/?api_key=12345abcdef’

Full Access
Question # 30

Drag and drop the capabilities from the left onto the Cisco Network Management Platforms that support the capabilities on the right.

Full Access
Question # 31

What is a principle of a code review process?

A.

Changes are made after the code is submitted to source control.

B.

It must not prevent code from getting into production as quickly as possible.

C.

Naming standards must be consistent.

D.

A technical lead must sign off on the review.

Full Access
Question # 32

An engineer must configure Cisco Nexus devices and wants to automate this workflow. The engineer will use an Ansible playbook to configure devices through Cisco NX REST API. Before the code is run, which resource must be used to verify that the REST API requests work as expected?

A.

Cisco Open NX-OS

B.

Cisco NX-OS SDK

C.

Cisco Learning Labs

D.

Cisco Code Exchange for Nexus

Full Access
Question # 33

Which command reverses the last commit without changing the index file or the working tree position?

A.

git revert HEAD

B.

git reset --hard HEAD~3

C.

git reset --soft HEAD^

D.

git revert

Full Access
Question # 34

A developer is developing a web application that uses username and password to authenticate to the next service. The user credentials must be available at any time in the application. The developer must choose and implement a secure method of storing the authentication credentials that are used in the automation code. Which password handling method must be used to minimize the security risk?

A.

Store the username and password in a separate configuration file.

B.

Store the username and password in a vault.

C.

Store the passwords in a dictionary.

D.

Store the username and password in code.

Full Access
Question # 35

Drag and drop the code from the bottom onto the box where the code is missing to complete the error path scenario. Not all options are used.

Full Access
Question # 36

A developer has addressed a bug that was found in the production code of an application. A separate file named ‘bug427896191v_fix” has been created with the changes to the code. Which Git command must be used to incorporate the bug fix into the production code?

A.

git rebase

B.

git cat-file

C.

git merge-file

D.

git bisert

Full Access
Question # 37

Drag and drop the code snippets from the bottom onto the blanks in the code to complete the happy path scenario. Not all options are used.

Full Access
Question # 38

Drag and drop characteristics from the left onto the infrastructure management methodologies on the right.

Full Access
Question # 39

A new application is being developed with specific platform requirements. The platform and application deployment and the ongoing platform management must be fully automated. The application includes a large database component that has significant disk I/O requirements. Which application deployment type meets the requirements?

A.

Python virtual environment

B.

virtual machine

C.

bare metal

D.

container

Full Access
Question # 40

Refer to the exhibit. Which code snippet represents the sequence.

A.

C:\Users\Admin\Desktop\Data\Odt data\Untitled.jpg

B.

C:\Users\Admin\Desktop\Data\Odt data\Untitled.jpg

C.

C:\Users\Admin\Desktop\Data\Odt data\Untitled.jpg

D.

C:\Users\Admin\Desktop\Data\Odt data\Untitled.jpg

Full Access
Question # 41

Refer to the exhibit.

Which workflow does the script automate?

A.

retrieves a media server that is being monitored

B.

updates a media server that is being monitored

C.

adds a media server to be monitored

D.

deletes a media server that is being monitored

Full Access
Question # 42

Refer to the exhibit.

The documentation outlines how to use credentials for the AMP API Which script successfully performs an API call using basic authentication?

A)

B)

C)

D)

A.

Option

B.

Option

C.

Option

D.

Option

Full Access
Question # 43

Drag and drop the types of management from the left onto the levels at which they are performed on the right.

Full Access
Question # 44

Refer to the exhibit.

A developer needs to upload a local file by using the REST API. The developer gathers information according to the documentation and sends the request by using the cURL command in the exhibit but gets an error code. Which action should be followed to get valid response?

A.

change content type as JSON

B.

add the authorization header with the access token

C.

add a username-password combination to request command

D.

change request method as GET

Full Access
Question # 45

What is a benefit of model-driven programmability?

A.

It addresses the static architecture of traditional networks being decentralized and complex.

B.

By modeling data, it ensures that vast quantities of data are usable for monitoring.

C.

It provides a programmatic and standards-based way of writing configurations to any network device.

D.

It simplifies management and operations by decoupling the networking hardware from its control mechanism.

Full Access
Question # 46

Which Cisco product provides malware and content filtering through DNS?

A.

Cisco ASA Firepower module

B.

Cisco AMP

C.

Cisco ISE

D.

Cisco Umbrella

Full Access
Question # 47

Access to the management interface of devices must be restricted by using SSH and HTTPS. Which two ports must be included in the ACLs for the protocols to work? (Choose two.)

A.

22

B.

23

C.

80

D.

443

E.

880

Full Access
Question # 48

What does a load balancer distribute in a network environment?

A.

outgoing connections to the network

B.

incoming traffic across multiple servers

C.

different TCP connections to the routers

D.

traffic in the network by leveraging the switch architecture

Full Access
Question # 49

Refer to the exhibit.

What do all the calls shown in the sequence diagram have in common?

A.

All the calls are optional.

B.

All the calls are asynchronous.

C.

All the calls are synchronous.

D.

All the calls depend on the catalog.

Full Access
Question # 50

Refer to the exhibit.

A developer must check packages on web load balancers that use nginx packages. The developer updates the servers as required in Ansible inventory and prepares an Ansible playbook to automate this workflow on related servers. Which process is being automated by the Ansible playbook?

A.

verifying that nginx is installed only if apache2 is unavailable on the system, and then updating all the other packages

B.

verifying, without installing, that apache2 is unavailable and that nginx is installed, and then updating the repository to the latest version

C.

uninstalling the apache2 server, installing the nginx server, and then updating all the packages to the latest version

D.

installing nginx, uninstalling apache2, and then verifying that the package repository is at the latest version

Full Access
Question # 51

What is a requirement when authenticating a RESTCONF API session with a router that runs Cisco IOS XE Software?

A.

No authentication is required.

B.

OAuth must be used.

C.

Basic authentication must be used.

D.

A token must be retrieved and the associated string must be embedded in the X-Auth-Token header.

Full Access
Question # 52

Refer to the exhibit.

A network engineer must collect information from the network using Cisco DNA Center APIs. The script must query for the devices with 'platformId' 'C9540-x' and then send commands to be executed. Which process is automated by the Python script?

A.

results gathering of the show version and show ip int brief commands

B.

output of show ip int brief command on devices of type C9500-40X

C.

execution information of the show version and show ip int brief commands

D.

list of executed commands on C9500-40X and the information of show ip int brief command

Full Access
Question # 53

Refer to the exhibit.

The script returns an output of 401. To use the supplied URL. an HTTP GET request must Be sent with an Authorization header. The header value is a BaseG4 encoded concatenation of the username and password. Which action must be taken to return an output of 200?

A.

Change the verify=False setting in the request to verify=True to enable HTTP Basic authentication

B.

Modify the method from LOGIN to GET and supply the username ;password value as JSON payload

C.

Verify that the username and password values imported from the configuration file ate still valid.

D.

Insert an Authorization header with the values username password from the supplied configuration file.

Full Access
Question # 54

Which tool allows changes to the configuration management toolset to be tested?

A.

Cisco VIRL

B.

NAPALM

C.

Ansible

D.

pyATS

Full Access
Question # 55

Refer to the exhibit.

A developer creates a script to obtain a list of devices by using the Cisco DNA Center API. The remote server authorizes the request only if an authentication token is supplied in the headers. A function named get_auth_token() must retrieve a valid token by using HTTP Basic Authentication. Which code must be added to complete the get_auth_token() function?

A.

resp = requests.post(url, auth=HTTPBasicAuth(DNAC_USER, DNAC_PASSWORD))

token = resp.json()['Token']

return token

B.

resp = requests.post(url, auth=(DNAC_USER, DNAC_PASSWORD))

token = resp.json ()['Token']

return token

C.

resp = http.post(url, auth=HTTPBasicAuth(DNAC_USER, DNAC_PASSWORD))

token = resp.json()['Token']

return token

D.

resp = http.post(url, auth=(DNAC_USER, DNAC_PASSWORD))

token = resp.json()['Token']

return token

Full Access
Question # 56

What are two considerations when selecting the "best route" for a network device to reach its destination? (Choose two.)

A.

MAC address

B.

metrics

C.

administrative distance

D.

IP address

E.

subnet mask

Full Access
Question # 57

Refer to the exhibit.

An engineer must check the admin rights of users on a database regularly and prepares

the Python script to automate the process. The script connects to the database and runs a query. What is a security issue about the secrets in the code that relates to secret protection?

A.

They must be stored in configuration files if there is a possibility of leakage.

B.

They must be Base64-encoded if stored in the user database.

C.

They must be encrypted if stored in the user database.

D.

They must be stored in configuration files if no authentication will be used.

Full Access
Question # 58

Into which type of Python data structure should common data formats be parsed?

A.

sequence

B.

set

C.

dictionary

D.

list

Full Access
Question # 59

A file that already exists in a local repository is updated. Which command must be executed to ensure that the changes in the file are included in the next Git commit?

A.

git update

B.

git merge

C.

git add

D.

git rebase

Full Access
Question # 60

Refer to the exhibit.

A network engineer uses model-driven programmability to monitor and perform changes on the network. The network engineer decides to use the NETCONF RPC message to complete one of their tasks. What is accomplished by sending the RPC message?

A.

The running-config of the device is returned.

B.

The name of each interface is reset to a default name.

C.

All the YANG capabilities supported by the device are returned.

D.

A list of interface names is returned.

Full Access